this post was submitted on 19 Jan 2024
59 points (84.7% liked)
Technology
60071 readers
3688 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Ping = attempted hack
Accessing random address = hack
Port scanning = hack
Every single email = hack
Every connection they have = hack
Seriously, how did they come up with that number?
Open a port, see how quickly you get thousands of attempts per hour.
Now be JPM, with thousands of internet exposed interfaces.
Though I think the number is exaggerated, but I'd need to see what they own.
Should a port scan by a bad actor be considered multiple hacking attempts or a single hacking attempt?
Another way to think about it: if a burglar tries various windows and doors to find an unsecured opening, is that considered multiple burglary attempts or a single burglary attempt?
I wouldn’t even consider a port scan a hack.
It’s just like a thief looking at your home to see if there are any windows or doors open.
I wouldn’t consider a port scan a hacking attempt either but I think it would be more like trying to open the front door or attempting to open a window to see if it’s locked. But if people are trying to do that to my house I wouldn’t be real happy. Of course if you’re a business and someone tries to open the door before you’re open is that really a problem? I know I’ve done that before.